Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
security operations center (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/168)
Export
export all inquiry results
(2)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
A National Maritime Cyber Security Operations Center (M-SOC) Concept
Oruc, Aybars
;
Bauk, Sanja
;
Zhou, Jianying
Journal of Marine Science and Engineering
2026
/
art. 17
https://doi.org/10.3390/jmse14010017
journal article EST
/
journal article ENG
2
journal article EST
/
journal article ENG
Stream clustering guided supervised learning for classifying NIDS alerts
Vaarandi, Risto
;
Guerra Manzanares, Alejandro
Future generation computer systems
2024
/
p. 231-244 : ill
https://doi.org/10.1016/j.future.2024.01.032
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 2, displaying
1 - 2
keyword
161
1.
Maritime Security Operations Center (M-SOC)
2.
security operations center
3.
maritime cyber security operations centers
4.
Municipal Operations Center
5.
security operation center
6.
algebraic operations
7.
buck operations
8.
Clean port operations
9.
commercial operations
10.
computer network operations
11.
cyber operations
12.
cyber operations exercises
13.
cyberspace operations planning
14.
Defensive Cyber Operations
15.
digital operations
16.
energy consumption of construction operations
17.
ferry operations
18.
influence operations
19.
microgrid operations
20.
NATO cyber operations definitions
21.
Offensive Cyber Operations
22.
operations research
23.
Port Operations
24.
port operations efficiency
25.
predictive analytics in port operations
26.
psychological operations
27.
supply chain operations reference (SCOR)
28.
supply chain operations reference (SCOR) model
29.
Sweedler operations
30.
term operations
31.
autoservice center
32.
center-tapped coupled inductor
33.
data center
34.
data center (DC)
35.
data center applications
36.
daycare center
37.
Non-emergency Contact Center
38.
shared service center
39.
shared service center (SSC)
40.
underwater data center
41.
urban learning center
42.
ad-hoc sensor networks security
43.
Automatic Security Verification
44.
Blockchain security
45.
cache security
46.
cloud security
47.
communication system security
48.
comprehensive system of economic security
49.
computer security
50.
cooperative security dilemma
51.
cyber security
52.
cyber security education
53.
cyber security exercises
54.
cyber security monitoring
55.
cyber security strategies
56.
cyber-physical system security
57.
cyber-security
58.
data and information security
59.
data security
60.
development of security cameras
61.
digital security practices
62.
drinking water security
63.
economic security
64.
economic security of enterprise
65.
emotional security
66.
energy security
67.
energy security indicator
68.
Estonian information security standard
69.
graded security
70.
hardware security
71.
hardware security primitive
72.
high level of security
73.
Homeland security
74.
human security
75.
information security
76.
information security and privacy
77.
initial level of security
78.
internal security
79.
international security
80.
investment and innovation security
81.
IPv6 security
82.
IT security
83.
IT security management
84.
job security
85.
long-term security
86.
maritime cyber security
87.
medium level of security
88.
metadata model for security measures
89.
Middle Eastern security
90.
Mobile security
91.
national cyber security strategy
92.
national security
93.
NATO. Science for Peace and Security Program
94.
network security
95.
network security monitoring
96.
OSCE (Organization for Security and Co-operation in Europe)
97.
passenger’s security
98.
policy-based routing security
99.
political and security cultures
100.
post-quantum security
101.
power system security
102.
quantitative security
103.
regional security
104.
RISC-V Security Verification
105.
Safety and Security in Sea Transportation
106.
safety and security testing
107.
security
108.
security adaptation
109.
security alert prioritization
110.
security analysis
111.
security and justice (AFSJ)
112.
Security and political science
113.
security and privacy
114.
security and privacy in smart grids
115.
Security Assertion
116.
Security Assertion Mining
117.
security closure
118.
Security Coverage
119.
security dataset
120.
security dilemma
121.
Security evaluation
122.
security evaluation instruments
123.
Security Level Evaluation
124.
Security limitations
125.
security log analysis
126.
security management
127.
security model
128.
security monitoring
129.
security notion
130.
security objectives
131.
security of data
132.
security of supply
133.
security patterns
134.
security policy
135.
security problem definition
136.
security proof
137.
security protocols
138.
security requirements
139.
security requirements engineering
140.
security research
141.
security risk assessment
142.
security risk management
143.
security risks
144.
security science and technology
145.
security strategies
146.
security systems for military objects
147.
security testing
148.
security training
149.
security verification
150.
security-by-design
151.
social security planning
152.
societal security
153.
software security
154.
software security level
155.
software security subcharacteristics
156.
sufficient level of security
157.
system of economic security
158.
system security
159.
terrorism security
160.
transmission System Security
161.
voting privacy and security
subject term
7
1.
Baltic Monitoring and Forecasting Center (BALMFC)
2.
Estonian Center for Safe and Trustworthy Artificial Intelligence (ECSTAI)
3.
FinEst Center for Smart Cities
4.
The Center for European Integration Studies
5.
UNDP Urban Learning Center
6.
National Computer Security Incident Response Teams (N-CSIRTs)
7.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT